Software Interview Questions
Questions Answers Views Company eMail

What are the vulnerabilities according to the extended CERT Taxonomy?

1 3551

What are the possible means of Internet attacks?

2 4915

What is phishing?

Global Logic,

4 9247

What are the methods of defense (in context to IT-Security)?

Taylor Engineering,

2 4404

What is a security policy?

Airtel, Techworld,

1 5392

What is a security mechanism?

2 4483

what is pulse code modulation?

Wipro,

2 9457

What is a security policy?

1 4850

What are the two types of security policies?

3 9724

What is the idea behind the Bell-La Padula model?

1778

What protects and describes the Chinese Wall model?

1 5116

What protects the Clark Wilson model?

Airtel,

1 4383

Name components of a firewall system?

HCL, SafariCom,

2 12668

Describe the term intrusion detection in the context of IT- security?

4 6791

Name firewall architectures?

4 7830


Un-Answered Questions { Software }

How can we make a executable file with python script?

407


Name areas of applications of data mining?

33


What is Run codes?

880


What are the different data structures in r?

51


give a simple example of physical and logical data independence

2084






Explain Syntax for Pattern Presentation and Visualization Specification?

37


Who invented quicksort?

490


How do I delete a table in postgresql?

421


How can a process change an environment variable in its caller?

622


State about ZooKeeper WebUI?

5


Do you know how can we check the value of a given variable is a number?

502


In informatica workflow manager, how many repositories can be created?

759


Can a Search can be done on a table with or without Index?

772


Mention what is the difference between published data sources and embedded data sources in tableau?

180


What is ng app in angular?

392